Need help? Ask the community or hire an expert.
Go to Avira Answers
Target:Flagstar Bank
Date discovered:29/07/2006

 General The goal is to get the following information:
    • Bank account
    • Credit card


Phishing method:
    • 'text' link

 Email Details From: support@flagstar.com
Subject: from Flagstar

Visible link: Renew Now
Actual link: http://departure.salasiam.com/gallery/onlinebanking/index.php
IP address: 203.155.49.154


The email is designed to avoid detection from Antispam and Antiphishing. The technique is:
    • The Body of the email contains HTML content.



This screenshot is how the phishing email looks like:


 Page Details Visible URL: http://departure.salasiam.com/gallery/onlinebanking/index.php
Actual URL: http://departure.salasiam.com/gallery/onlinebanking/index.php
IP address: 203.155.49.154


The phishing page will look like the following:




Description inserted by Dominik Auerbach on Saturday, July 29, 2006

Back . . . .